1. Who coined the term ‘Computer Virus’?
a) Frederick Cohen
b) William Gibson
c) John Von Neumann
d) Charles Babbage
Answer: ( a)
· Frederick Cohen is an American Computer Scientist and best known as inventor of computer virus defense techniques.
· The term VIRUS stands for Vital Information Resource Under Siege.
· A computer virus is a malware that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive.
· William Gibson coined the term ‘ Cyber Space’ in his novel ‘ Neuromancer ‘ published in 1984.
· John Von Neumann formulated the ‘ Stored program concept ‘.
· Charles Babbage, the Father of Computer who invented Analytical Engine and Difference Engine
2. Operating system is a type of
a) Application software
b) Utility software
c) System software
d) None of these
Answer: (c)
· Operating System is System Software.
· Operating system acts as an interface between user and hardware.
· System software is a type of computer program that is designed to run a computer’s hardware and application program.
3. What is the expansion of the term ASCII ?
a) American security code for information Interchange
b) American scientific code for information Interchange
c) American Standard Code for Interchange information
d) American Standard Code for Information Interchange
Answer: (d)
· ASCII Stands for American Standard Code for Information Interchange.
· ASCII is a character-encoding scheme used in a Computer.
· ASCII uses 7 bits or 8 bits to represent character.
· ASCII-7 can represent 128 characters and ASCII-8 can represent 256 characters.
4. Attempt to acquire sensitive information such as passwords and credit card details by masquerading as a trustworthy entity.
a) Phishing
b) Spoofing
c) Hacking
d) None of these
Answer: (a)
· Phishing is an attempt to acquire sensitive information such as passwords and credit card details by masquerading as a trustworthy entity.
· Phishing is a cybercrime carried out by email spoofing.
· Spoofing is a cyber crime mostly used for concealing the identity of the sender impersonating another computer system.
· Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose.
· The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.
5. Process of ‘knowledge discovery in databases' is
a) Data tuning
b) Data Diddling
c) Data Fragmentation
d) Data Mining
Answer: (d)
· Data mining is the extraction of patterns and knowledge from large amount of data.
· Database Tuning is the activity of making a database application run more quickly.
· Changing data before or during entry in to computer system is called Data Diddling
· Data Fragmentation means in some operating system's file systems, a data file over a certain size is stored in several fragments rather than in a single contiguous sequence of bits in one place on the storage medium.
No comments:
Post a Comment